Displaying 20 results from an estimated 20000 matches similar to: "Question on iptables"
2011 Dec 27
3
how to stop hacking of my server
Hi list someone is trying to hack my server . Is there any way by whcih I
can stop hacking of my server except iptables ? I want to stop on the basis
of sip.conf account only. bcoz I can't apply iptables rules on server it's
remote server of server provider and we used it for making voip call for
customers.
for the time been i have close all sip accounts. but can't stop for more
then
2017 Mar 01
3
fail2ban Asterisk 13.13.1
Hello, fail2ban does not ban offending IP.
NOTICE[29784] chan_sip.c: Registration from
'"user3"<sip:1005 at asterisk-ip:5060>' failed for 'offending-IP:53417' - Wrong
password
NOTICE[29784] chan_sip.c: Registration from
'"user3"<sip:1005 at asterisk-ip:5060>' failed for ?offending-IP:53911' -
Wrong password
systemctl status
2013 Jan 02
8
Auto ban IP addresses
Greetings all,
I have been seeing a lot of
[Jan 2 16:36:31] NOTICE[7519]: chan_sip.c:23149 handle_request_invite:
Sending fake auth rejection for device
100<sip:100 at 108.161.145.18>;tag=2e921697
in my logs lately. Is there a way to automatically ban IP address from
attackers within asterisk ?
Thank you
2015 Sep 13
4
Fail2ban
Hello
I'm using the Fail2ban. I configuration below. I want to try to
prevent the continuous password. Fail2ban password that does not
prevent this form. (Asterisk 1.8 / Elastix interface)
What could be the problem ?
Asterisk log;
"Registration from '<sip:3060 at sip.x.eu;transport=UDP>' failed for
'x.x.x.x:32956' - Wrong password"
Fail2ban asterisk
2010 Dec 25
2
sip attack.. fail2ban not stopping attack
My server is being attached all day and fail2ban is not stopping the
attack. I updated stamstamp to match fail2ban requirements.
[2010-12-25 18:54:34] NOTICE[15415]: chan_sip.c:21830
handle_request_register: Registration from '"7002" <sip:7002 at x.x.x.x>'
failed for '38.108.40.94' - No matching peer found
[2010-12-25 18:54:34] NOTICE[15415]: chan_sip.c:21830
2018 May 17
2
Decoding SIP register hack
I need some help understanding SIP dialog. Some actor is trying to
access my server, but I can't figure out what he's trying to do ,or how.
I'm getting a lot of these warnings.
[May 17 10:08:08] WARNING[1532]: chan_sip.c:4068 retrans_pkt:
Retransmission timeout reached on transmission
_zIr9tDtBxeTVTY5F7z8kD7R.. for seqno 101
With SIP DEBUG I tracked the Call-ID to this INVITE :
2013 May 31
2
Help me understand these log messages
OK, I need a bit of help here. I'm configuring a new Asterisk 11
system and I accidentally let my firewall rules drop for a day or so.
When I logged in today, I found messages like the ones below on my
asterisk console. Obviously somebody was trying to take advantage of
my carelessness. So can someone explain what would cause these types
of messages to show up on my console?
I understand
2011 Dec 29
2
Interesting attack tonight & fail2ban them
I happened to be in the cli tonight as some (208.122.57.58) initiated a simple attack - just trying to make long distance calls from outside context. Although harmless, this went on for several minutes as the idiot just used up my bandwidth with SIP messages. Here's and example:
[2011-12-28 22:53:42] NOTICE[9635]: chan_sip.c:14035 handle_request_invite: Call from '' to extension
2017 Mar 02
3
fail2ban Asterisk 13.13.1
If this is a small site, I recommend you download the free version of SecAst
(www.telium.ca <http://www.telium.ca> ) and replace fail2ban. SecAst does
NOT use the log file, or regexes, to match etc.instead it talks to Asterisk
through the AMI to extract security information. Messing with regexes is a
losing battle, and the lag in reading logs can allow an attacker 100+
registration
2019 Jun 26
4
iptables - how to block established connections with fail2ban?
I am working to a CentOS 6 server with nonstandard iptables system
without rule for ACCEPT ESTABLISHED connections. All tables and chains
empty (flush by legacy custom script) so only filter/INPUT chain has
rules (also fail2ban chain):
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-postfix tcp -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all --
2018 Aug 26
2
Mail has quit working
Am 26.08.2018 um 15:25 schrieb TE Dukes:
> Checked maillog:
>
> Aug 26 09:12:31 ts130 postfix/qmgr[2194]: E5B948331053: from=<fail2ban at palmettodomains.com>, size=469, nrcpt=1 (queue active)
> Aug 26 09:12:31 ts130 postfix/smtp[2307]: connect to 127.0.0.1[127.0.0.1]:10024: Connection refused
> Aug 26 09:12:32 ts130 postfix/smtp[2307]: E5B948331053: to=<root at
2015 Sep 14
2
Fail2ban
I solved the problem. "action.d/iptables-custom.conf" include only udp.
service fail2ban restart
Thank you.
On Sun, Sep 13, 2015 at 9:17 PM, Andres <andres at telesip.net> wrote:
> On 9/13/15 11:16 AM, Gokan Atmaca wrote:
>>
>> Hello
>>
>> I'm using the Fail2ban. I configuration below. I want to try to
>> prevent the continuous password.
2017 Dec 30
4
SIP invite timeouts : how is someone sending invites from our server ??
I've been getting a lot of timeouts on non-critical invite transactions.
I turned on sip debug. They were the result of SIP invites like this:
Retransmitting #10 (NAT) to 185.107.94.10:13057:
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
215.45.145.211:5060;branch=z9hG4bK-524287-1---zg4cfkl50hpwpv4p;received=185.107.94.10;rport=13057
From:
2014 Apr 04
4
Asterisk 1.6
Hello All, my asterisk server is constantly under attack
[Apr 4 06:56:00] NOTICE[21745]: chan_sip.c:25673 handle_request_register:
Registration from '"4941" <sip:4941 at public_ip>' failed for '194.100.46.132
194.100.46.132:56714' - Wrong password
[Apr 4 06:56:00] NOTICE[21745]: chan_sip.c:25673 handle_request_register:
Registration from '"4941"
2011 May 11
2
iptables to block region-specific ip's?
Hello,
I'm running fail2ban on my centos machine. It's handling sshd and
postfix, and is working quite well. From the reports I'm seeing all
the atempts are from a certain registrar's region, I won't name it,
and was wondering instead of blocking individual ip's if there was a
way I could block with iptables the complete region of ip's. I realize
this will cut off a
2011 Apr 05
2
Iptables configuration to handle brute, force registrations?
fail2ban might be good for this.
On 04/05/2011 01:00 PM, asterisk-users-request at lists.digium.com wrote:
>
> Date: Tue, 5 Apr 2011 08:44:41 -0700 (PDT)
> From: Steve Edwards<asterisk.org at sedwards.com>
> Subject: Re: [asterisk-users] Iptables configuration to handle brute
> force registrations?
>
> On Tue, 5 Apr 2011, Gilles wrote:
>
>> I'm no expert
2010 Apr 17
2
Changing storm-prevention behaviour in logger.conf
Dear List,
According to https://issues.asterisk.org/view.php?id=14905 there is a storm
prevention mechanism in newer Asterisks. If i look in my logfile, i see :
[2010-04-17 15:12:01] NOTICE[1190] chan_sip.c: Registration from '"xxxx"
<sip:xxx at xxx.xxx.xxx.xxx>' failed for 'xx.xx.xx.xx' - Wrong password
[2010-04-17 15:12:01] NOTICE[1190] chan_sip.c: Last message
2008 Aug 19
4
Simple IPTABLES Question
I added these rules to IPTABLES to slow brute force attacks.
iptables -A INPUT -p tcp --dport 22 -s my_subnet/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent
--set --name SSH
iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent
--update --seconds 60 --hitcount 5 --rttl --name SSH -j DROP
I would like log entries when connections are dropped to see
2018 Aug 30
6
getting invites to rtp ports ??
On Wed, Aug 29, 2018 at 6:20 PM Telium Support Group <support at telium.ca>
wrote:
> Depending on log trolling (Asterisk security log) misses a lot, and also
> depends on the SIP/PJSIP folks to not change message structure (which has
> already happened numerous time). If you are comfortable hacking
> chan_sip.c you may prefer to get the same messages from the AMI. It still
2010 Jun 29
3
Find a way to block brute force attacks.
Hello list.
I'm trying to find a way to block any ip that tries to login more than three
times with the wrong password and try to log in three different extensions. For
I have suffered some brute force attacks on my asterisk in the morning
period.
The idea would be: Any ip with three attempts without success to log into an
extension is blocked.
Is there any way to accomplish this directly